Unlock instant, AI-driven research and patent intelligence for your innovation.

Technique for secure wireless lan access

A wireless local area network and wireless technology, which is applied in the direction of public key for secure communication, security device, wireless communication, etc., can solve the problem of indistinguishable wireless LAN

Inactive Publication Date: 2006-05-10
THOMSON LICENSING SA
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Thus, a wireless LAN cannot distinguish between traffic from an authorized mobile communication device and from a hacker who has successfully evaded the initial authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Technique for secure wireless lan access
  • Technique for secure wireless lan access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] figure 1 A schematic block diagram of a communication network 10 is shown, and the communication network 10 includes: an access device 11 for enabling at least one mobile communication device, and preferably a plurality of mobile communication devices (for example, a mobile communication device 12 1 、12 2 and 12 3 ) can securely access a private data network 14 or a public data network 16 such as the Internet. In a preferred embodiment, the mobile communication device 12 1 including laptop computers, while mobile communication devices 12 2 including personal data assistants, and mobile communication devices 12 3 Includes wireless handsets.

[0009] figure 1 The access device 11 includes a plurality of access points (AP), by the AP 18 1 -18 4 Preferably at least one, and preferably a plurality of access points (APs), mobile communication device 12 1 、12 2 and 12 3 Each accesses a wireless local area network (LAN) 20 via the access point. Although shown separa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An access device (11) provides secure access to at least one mobile communication device (121-123) by first authenticating the mobile communication device itself and subsequently authenticating traffic from the device. To authenticate traffic from a mobile communication device, an authentication server (24) associated with the authentication device (11) establishes a Wired Equivalent Privacy (WEP) encryption key for both the access device and the mobile communication device. The authentication server provides the WEP encryption key to the device along with a command to cause the device to execute a resident ActiveX control to encrypt traffic using the WEP encryption key. Using an ActiveX control in a mobile communication device to encrypt traffic with a WEP encryption key provides a simple, easy-to-implement method for secure access.

Description

technical field [0001] The present invention relates to a technique for enabling secure access of a mobile communication device to a wireless local area network (LAN). Background technique [0002] Currently, data communication service providers have established wireless local area networks (LANs) (“hotspots”) at publicly accessible facilities such as rest areas, cafes, and libraries to allow mobile communication devices to access private data networks for a fee or A public data network such as the Internet. When entering such a publicly accessible facility, a mobile communication device typically establishes a communication link through a wireless channel with an access point (AP) in order to access a wireless LAN, and otherwise public or private networks. Currently, for web browser-based authentication, initial authentication of the device is performed by using the secure Hypertext Transfer Protocol (HTTPS) implemented by browser software in the mobile communication devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/66G06F11/30G06F15/16G06F15/173H04L9/00H04L12/28H04L12/56H04L12/66H04L29/06H04M1/68H04M3/16H04W12/00H04W74/00H04W84/12
CPCH04L63/168H04W12/06H04W74/00H04W84/12H04W12/0431H04L9/30H04L9/32H04L12/28H04W12/04
Inventor 张俊彪索拉布·马瑟库马·拉马斯瓦米
Owner THOMSON LICENSING SA